Images List Premium Download Classic

Public Key

Public Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Method for secure communication using asymmetric & symmetric encryption over insecure communications
Sony Interactive Entertainment Inc.
January 11, 2018 - N°20180013728

Data may be protected using a combination of symmetric and asymmetric cryptography. A symmetric key may be generated and the data may be encrypted with the symmetric key. The symmetric key and a only a portion of the symmetrically encrypted data may then be encrypted with an asymmetric public key. The entire set of encrypted data, including the asymmetrically encrypted ...
Data transmission method and apparatus
Tencent Technology (shenzhen) Company Limited
January 11, 2018 - N°20180013555

A data transmission method and apparatus are disclosed that resolves a technical problem where an existing data encryption algorithm offers poor security during transmission of data. The solution includes obtaining, by a first terminal, a data transmission request sent by a second terminal, the data transmission request at least carrying first encrypted data that is obtained by encrypting first exchange ...
Shared secret communication system with use of cloaking elements
Securerf Corporation
January 11, 2018 - N°20180013554

Systems and methods to produce cloaked keys and shared secret data are described. A first device may select a private key, for the first device, based on a first set of rewritten conjugates. The first device may receive a public key from a second device. The public key may be based on a private key of the second device. The ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Recording data and using the recorded data
International Business Machines Corporation
January 11, 2018 - N°20180012027

A method and system for recording data including content in a recording medium on a computer apparatus. First encrypted data, obtained by encrypting the data using a medium key created for each recording medium, is recorded in a recording medium. Second encrypted data, obtained by encrypting the medium key using a public key, is recorded in the recording medium. A ...
Recording data and using the recorded data
International Business Machines Corporation
January 11, 2018 - N°20180012026

A method and system for recording data including content in a recording medium on a computer apparatus. First encrypted data, obtained by encrypting the data using a medium key created for each recording medium, is recorded in a recording medium. Second encrypted data, obtained by encrypting the medium key using a public key, is recorded in the recording medium. A ...
Key management for wireless communication system for communicating engine data
Ge Aviation Systems Llc
January 04, 2018 - N°20180007547

Systems and methods for recording and communicating engine data are provided. One example aspect of the present disclosure is directed to a method for key management. The method includes generating a pair of keys, wherein one of the pair of keys is a private key, and wherein one of the pair of keys is a public key. The method includes ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Public key pinning for private networks
Airwatch Llc
January 04, 2018 - N°20180007021

Disclosed are various approaches for validating public keys pinned to services or servers on private networks. A client device can request a first certificate from a trust service. The client device can then validate that the first certificate from the trust service is signed by a preinstalled certificate stored on the client device. Subsequently, the client device can receive a ...
Automated propagation of server configuration on a server cluster
Symantec Corporation
January 04, 2018 - N°20180006827

Techniques are disclosed to automate secure propagation of a configuration to a plurality of servers in a server cluster. For example, the techniques may include a method. The method may include receiving, at a first computing device, a first public key associated with a target computing device, the first computing device having an updated configuration. The method may further include ...
Public key infrastructure using blockchains
Intel Corporation
January 04, 2018 - N°20180006826

Techniques for implementing public key infrastructure using blockchains are described. An apparatus may receive, from a introducee principal, a proof-of-work. The apparatus may combine the proof-of-work with an identifier of the introducee principal. The apparatus may generate an introduction of the introducee principal. The introduction may include signing, using an asymmetric private key assigned to the apparatus, the combination of ...
Multi-hop secure content routing based on cryptographic partial blind signatures and embedded terms
Qualcomm Incorporated
January 04, 2018 - N°20180006823

At a transmitter node, a commitment value c is obtained as a function of a message m. The commitment value c and transmitter terms of use ta for the message m are then sent to a receiver node without disclosing the message m. A cryptographic receiver signature sb over the commitment value c and the transmitter terms of use ta ...
Arbitrary base value for epid calculation
Intel Corporation
January 04, 2018 - N°20180006822

Systems and methods for using an arbitrary base value for epid calculations are provided herein. A system to use arbitrary base values in enhanced privacy id (epid) calculation, where the system includes a microcontroller; and a memory coupled to the microcontroller; wherein the microcontroller is to: obtain an arbitrary value at a member device, the member device being a member ...
Information sharing system, computer, and information sharing method
Hitachi, Ltd.
January 04, 2018 - N°20180006810

It is provided an information sharing system, comprising a server, and an in-vehicle system. The server includes: a first storage part; a first key generation part configured to generate a first private key and a first public key, if keys can be exchanged with the in-vehicle system; and a signature generation part configured to generate a signature value of the ...
Electronic voting system
Hitachi, Ltd.
January 04, 2018 - N°20180005476

A method is described that involves creating a private key and a public key cryptographic key pair, generating a unique and random identifier for a voter's vote and accepting an election vote from said voter. The vote and identifier are electronically signed with the private key to create a digital signature. The vote and identifier are provided in a human ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method for operating a network and a network
Nec Europe Ltd.
December 28, 2017 - N°20170374051

A method for providing a guarantee of a network property includes receiving, from a network user, a signature and a request for the network property, wherein the request for the network property includes a public key of the network user; verifying that the signature received from the network user matches the public key of the network user; demonstrating the capability ...
Registering, managing, and communicating with iot devices using domain name system processes
Verisign, Inc.
December 28, 2017 - N°20170374042

Provided herein is a method for registering an iot device with a dns registry. The method can include obtaining, at a dns server, an identifier, ip address, and a public key of an asymmetric key pair associated with the iot device from a network gateway device that is in communication with the iot device, wherein the asymmetric key pair is ...
Distributed processing of a product on the basis of centrally encrypted stored data
Giesecke+devrient Mobile Security Gmbh
December 28, 2017 - N°20170374041

The invention provides a system for encryptedly storing product data of a product having an attached tag centrally on a product data server, and reading out the centrally stored product data by production stations which are to process the product. The product data are encrypted with a document key which in turn is encrypted with a public key of the ...
Authentication via revocable signatures
International Business Machines Corporation
December 28, 2017 - N°20170374033

Methods, systems and computer program products are provided for authenticating a message via a revocable signature. The method includes, at a signing computer, generating first auxiliary data and second auxiliary data respectively dependent on a public key and a private key of a public-private key pair for the message. The signing computer hashes the message and the first auxiliary data ...
Data encryption method, decryption method, apparatus, and system
Tencent Technology (shenzhen) Company Limited
December 28, 2017 - N°20170373850

A data encryption method performed at a computing device includes: receiving a data encryption request, the data encryption request indicating original data that needs to be encrypted and at least two target storage devices that are communicatively connected to the computing device; in response to the data encryption request: separately obtaining unique device information of the at least two target ...
Method for updating a public key
National Chi Nan University
December 28, 2017 - N°20170373847

A method for updating a public key is provided. The method includes: acquiring, by a transmitting-end device, a first hash value calculated based on a first current public key; generating a first update public key and a first update private key; generating an update string such that a hash value of a hash function calculated based at least on the ...
Secure circuit for encryption key generation
Apple Inc.
December 28, 2017 - N°20170373844

Techniques are disclosed relating to relating to a public key infrastructure (pki). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. In some embodiments, the secure circuit is configured to generate a public key and a private key for an ...
Secure circuit for encryption key generation
Apple Inc.
December 28, 2017 - N°20170373843

Techniques are disclosed relating to relating to a public key infrastructure (pki). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. The secure circuit is configured to generate a key pair having a public key and a private key, and ...
Loading